Block chain discussion and replies

In chapter 6, the author describes basic components of a business network. Create a new thread, choose one of the types of participants discussed in chapter 6, and explain how you think the chosen participant type could effectively use assets in an enterprise blockchain environment to impact the organization’s outcomes.

Then think of three questions you’d like to ask other students and add these to the end of your thread. The questions should be taken from material you read in Chapter 5 or 6. You’re not trying to test each other, but you are trying to start a discussion. 

You must do the following:

1) Create a new thread. As indicated above, choose one of the types of participants discussed in chapter 6, and explain how you think the chosen participant type could effectively use assets in an enterprise blockchain environment to impact the organization’s outcomes. Then think of three questions you’d like to ask other students and add these to the end of your thread. The questions should be taken from material you read in Chapter 5 or 6. You’re not trying to test each other, but you are trying to start a discussion.

2) Select AT LEAST 3 other students’ threads and post substantive comments on those threads. Your comments should answer AT LEAST one of the questions posed in the thread and extend the conversation started with that thread. Make sure that you include the question in your comment so I can see what question you’re answering.

ALL original posts and comments must be substantive AND ORIGINAL. (I’m looking for about a paragraph – not just a short answer.) Do not plagiarize!! Use your own words.

The discussions in this class exist to simulate face-to-face discussions. To reach that goal, we will adhere to the 3CQ model. After posting each thread, you will post at least 3 comments on other students’ threads, and each comment must conform to the 3CQ model (Compliment, Comment, Connect, Question). This model encourages discussions that extend class learning and participation.

Here is a description of the 3CQ model:

1.            Compliment – Start off positive. Compliment the person on something specific you have read or observed in the person’s blog post.  For example:

  • Thanks for sharing your thoughts! I really liked …

2.            Comment – Comment on something relevant and meaningful about what the person wrote. Be specific! Remember your comment might not always be agreement. You can “politely” disagree.  For example:   

  • I agree with you about …
  • I respect your opinion, but I think …

3.            Connect – Connect with something the person wrote (Text-to-Self, Text-to-Text, Text-to-World). Explain your connection with details giving your audience a clear idea of what you’re talking about by using sensory details.   For example:

  • I can connect with you about …
  • I once read a story about …
  • I had the same thing happen to me…

4.            Question – Ask a specific question about something written or the writer. Keep the conversation going!

Remember that ALL discussions must use the 3CQ approach to interaction.

Intro to Data Mining

Discuss techniques for combining multiple anomaly detection techniques to improve the identification of anomalous objects. Consider both supervised and unsupervised cases.

All discussions should contain at least one reference (and matching in-text citation in APA format).

IA week13 DB

 

Hello,

i need this paper by 11/18 afternoon.

Strictly No plagiarism please use your own words.

What are some of the industry standard certifications that exists.  Which ones are the most sought after in the IT security field and why? What are the requirements for the certifications, test, number of questions, duration, domain, years of experience required?

Your post should be at least 350 words.

Make sure Strictly No plagiarism content should not match and even the reference should not match in plagiarism 

security architecture 15 .2

 

Read the attached paper carefully and write a research summary ,in two sections

1- Overall summary

2- What you would like to add or change to the conclusion section 

This assignment should be in APA format, plagiarism free and have to include at least two references other than the paper. 1000 words minimum

End product 3

  • Distinguish between due care and due diligence.
  • Based on your experience, provide examples of due care and due diligence.
    2000 words 

security measures

 

Many business environments have both visible and invisible physical security controls. You see them at the post office, at the corner store, and in certain areas of your own computing environment. They are so pervasive that some people choose where they live based on their presence, as in gated access communities or secure apartment complexes. Alison is a security analyst for a major technology corporation that specializes in data management. This company includes an in house security staff (guards, administrators, and so on) that is capable of handling physical security breaches. Brad experienced an intrusion—into his personal vehicle in the company parking lot. He asks Alison whether she observed or recorded anyone breaking into and entering his vehicle, but this is a personal item and not a company possession, and she has no control or regulation over damage to employee assets. This is understandably unnerving for Brad, but he understands that she’s protecting the business and not his belongings.

When or where would you think it would be necessary to implement security measures for both?

Convert the following C++ program into an x86 assembly language program. Make sure to use your “Chapter 8” understanding of advanced functions, parameter passing, and local variables. Post ONLY your ASM file here to Blackboard when complete

 #include

using namespace std;

int IsSemifauxtrifactored(int value)
{
    // Return 1 if a number’s factors/divisors from (value – 1) to 1 sum up to a quarter of the number value
    // Return 0 otherwise

    // A number is called “semifauxtrifactored” if its summed factors/divisors equal a quarter of the number itself
    // Integer division is used, so remainders on the halving can be lost
    // That’s why…

    // 7 is a semifauxtrifactored number
    // 7 divided by 4 with integer division is (7 / 4) = 1
    // 7 % 6 -> 1
    // 7 % 5 -> 2
    // 7 % 4 -> 3
    // 7 % 3 -> 1  
    // 7 % 2 -> 1  
    // 7 % 1 -> 0   FACTOR!
    // 7 is a semifauxtrifactored number since its factors (1) equal a quarter of the number (1)

    // 6 is a normal number
    // 6 divided by 4 with integer division is (6 / 4) = 1
    // 6 % 5 -> 1
    // 6 % 4 -> 2
    // 6 % 3 -> 0   FACTOR!
    // 6 % 2 -> 0   FACTOR!  
    // 6 % 1 -> 0   FACTOR!
    // 6 is a normal number since its factors (1 + 2 + 3) do not equal a quarter of the number (1)
}

int main()
{
    cout << "Enter a value: ";
    int value;
    cin >> value;
    value = IsSemifauxtrifactored(value);
    if (value == 1)
    {
 cout << "The number is semifauxtrifactored!";
    }
    else
    {
 cout << "The number is normal";
    }

    cout << endl;
    system(“PAUSE”);
}